Colonial Pipeline and D.C. Police Paying the Price
| 0 CommentsQuickly reacting to a data breach can save a company time and money but preparing for one can save even more. With all [...]
Defending Against COVID-19 Cyber Scams and Cyber Threats
| 0 CommentsCyber threats are continually evolving in complexity and volume, but the pandemic presents new opportunities for cyber [...]
Amazon Employee Responsible For User Data Breach
| 0 CommentsRecently, one or more Amazon employees disclosed customer email addresses to an unknown third party, prompting Amazon [...]
Some Popular Android Apps Found To Include Malware
| 0 CommentsGoogle does an admirable job of keeping its sprawling Play Store free of apps containing malware. Their verification [...]
This New Ransomware Can Infect A Network In Just Minutes
| 0 CommentsNot all ransomware strains are created equally. Some are designed as slow burns that will infect a target system, [...]
Photoshop Testing Security For Images To Prevent Theft And Fakes
| 0 CommentsDeep Fakes are becoming an increasingly large problem. If you're not familiar with the term, a Deep Fake is an advanced [...]
Mac And Android Added To GravityRAT Malware’s Targets
| 0 CommentsMalware comes in all shapes and sizes. Some strains copy and encrypt files. Others serve annoying ads.
Get Updates on
Industry News
Sign up here to get the latest updates regarding cybersecurity, cloud computing, artificial intelligence (AI) and machine learning, as well as unified communications.